2022-01-24 08:47:01 +00:00
id : CVE-2022-0218
info :
2022-02-28 20:38:39 +00:00
name : HTML Email Template Designer < 3.1 - Stored Cross-Site Scripting
2022-01-24 08:47:01 +00:00
author : hexcat
2022-02-09 19:42:28 +00:00
severity : medium
2022-02-28 20:38:39 +00:00
description : WordPress Email Template Designer WP HTML Mail allows stored cross-site scripting through an unprotected REST-API endpoint.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can exploit this vulnerability to inject malicious scripts into the subject field of an email template, potentially leading to unauthorized access, data theft, or further compromise of the affected system.
2023-09-06 11:59:08 +00:00
remediation : |
Update to version 3.1 or later of the HTML Email Template Designer plugin to fix the vulnerability.
2022-01-24 08:47:01 +00:00
reference :
- https://www.wordfence.com/blog/2022/01/unauthenticated-xss-vulnerability-patched-in-html-email-template-designer-plugin/
- https://wordpress.org/plugins/wp-html-mail/
- https://nvd.nist.gov/vuln/detail/CVE-2022-0218
2022-05-17 09:18:12 +00:00
- https://plugins.trac.wordpress.org/changeset/2656984/wp-html-mail/trunk/includes/class-template-designer.php
2022-02-09 19:42:28 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2022-02-09 19:42:28 +00:00
cve-id : CVE-2022-0218
cwe-id : CWE-79
2023-08-31 11:46:18 +00:00
epss-score : 0.03872
2024-01-14 13:49:27 +00:00
epss-percentile : 0.91041
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:codemiq:wordpress_email_template_designer:*:*:*:*:*:wordpress:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : codemiq
product : wordpress_email_template_designer
2023-09-06 11:59:08 +00:00
framework : wordpress
2024-01-14 09:21:50 +00:00
tags : cve,cve2022,wordpress,wp-plugin,xss,codemiq
2022-01-24 08:47:01 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-01-24 08:47:01 +00:00
- method : GET
path :
- "{{BaseURL}}/index.php?rest_route=/whm/v3/themesettings"
matchers-condition : and
matchers :
- type : word
part : body
words :
- '"background":'
- '"footer":'
condition : and
- type : word
part : header
words :
- "application/json"
- type : status
status :
- 200
2024-01-26 08:31:11 +00:00
# digest: 490a00463044022064bd237723ae444eccdae4441dd01095496ab09b0f3e7910f10b73a9d96c775c0220639770df2f57c70a8343d00ef5b6da98c2326ef4f6c3cc0550c3e51ccc3810e5:922c64590222798bb761d5b6d8e72950